A Nuclear Response to Cyberattacks? Comprehensive Defense Is a Better Approach
Most of the world hopes there’s never a nuclear response to anything. Yet, the fact that the Pentagon is considering the nuclear option in the event of a cyberattack indicates the growing sophistication and risk underpinning modern cyberwarfare. The Pentagon has issued a report highlighting possible updates to the Nuclear Posture Review, which details the circumstances under which the U.S. will consider responding to an attack with nuclear force.
Why Healthcare Is A Top Target For Hackers
Health IT Outcomes |
The healthcare field is currently in a precarious position. New technologies promise to improve care and increase the success of outcomes with far greater consistency. But those same technologies create vulnerabilities and invite cyberthreats that put every one of those agendas in jeopardy. U.S. Health and Human Services’ Office for Civil Rights believes the final number of cyberattacks in 2017 will far outpace 2016’s figure.
Three keys to a multi-layer security strategy
Health Data Management |
The cybersecurity landscape is more threatening than ever, and healthcare is an industry under attack. According to a report from Symantec, healthcare providers face the second highest rate of incidents, with ransomware propelling the number of attacks forward.
What the Apple Face ID Hack Tells Us About Future Cyberattacks
One of the flashiest and most sophisticated features of Apple’s $1,000 iPhone X is Face ID. In addition to being fun and futuristic, Apple touted this as a way to significantly upgrade security over the more commonly used passwords or Touch ID. But within days of hitting the market, the phone’s facial recognition technology had been hacked.
How To Make Email Security Central To Your Cybersecurity Strategy In 2018
Information Security Buzz |
2017 was another watershed year for cybersecurity. The breaches at Equifax and Yahoo! stand out for their size, but the more troubling development is how much more targeted attacks have become. The HBO attack showed us that hackers are willing to focus on valuable intellectual property or private conversations and hold them hostage for a hefty ransom. The continued attention on the Democratic National Committee hack also revealed that hackers have political agendas that can transcend financial motives.
Is Your Enterprise IT the Best It Can Be?
IT Briefcase |
Enterprise IT is a driver of the global economy. In 2017, an estimated $3.5 trillion was spent on software and telecommunications services. Those figures exceeded expectations, and spending on software is expected to grow by another 7.6 percent this year. Investment in devices is also expected to climb another 3.8 percent, ultimately reaching $654 billion.